We recommend that the security administrator use control options, user-based controls, and entitlement-based controls to control logging based on the business needs of the installation.
Business Value:
Event logging helps ensure that your site enforces policy, but logging does add costs in terms of processing path length, data repository size, and so on. Consider this potential overhead when you determine which logging controls to activate.
Additional Considerations:
Periodically review these controls to ensure that the requested logging controls remain valid and support business objectives, security policy, and site requirements.
The following global control options help you customize when and how you capture data to logs:
Logs information in ACID security records to indicate the following actions:
Allows you to note the following actions:
The LOG option affects all facilities.
Activates a diagnostic security trace on the activities of all defined users or of specific users.
By default, CA Top Secret logs failed access attempts. A security administrator can also specify ACTION(AUDIT) in a PERMIT command to cause logging records to be written. In addition, logging occurs when resources that are added to the AUDIT special ACID are accessed.
You can log all activity for a user by using one of the following ACID attributes:
Specifies an audit ACID activity.
Activates a diagnostic trace on all ACID activity, such as initiations, resource access, violations, and user security mode.
Consider the role that special privileges play on an individual user level and their impact on logging. CA Top Secret for z/OS generates special log entries based on the following ACID privileges:
Specifies that no data set name checks are performed. CA Top Secret for z/OS bypasses all data set access security checks. Auditing occurs.
Allows an ACID to execute any command or transaction for all facilities, regardless of Limited Command Facility (LCF) restrictions. If the NOLCFCHK attribute is in an ACID, that ACID's terminal cannot be locked. Auditing occurs.
Allows an ACID to bypass security checking for all owned resources except data sets and volumes. Auditing occurs.
Allows an ACID to bypass alternate ACID usage and all job submission security checking. Associated ACIDs may submit all jobs regardless of the (derived) ACID on the job statement being submitted. Auditing occurs.
Allows an ACID to bypass volume level security checking. Auditing occurs.
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|